Cyber Threat Intelligence Book by Aaron Roberts
Home > Computer & Internet > Computer security > Privacy & data protection > Cyber Threat Intelligence
Cyber Threat Intelligence

Cyber Threat Intelligence


     5  |  1 Reviews 
5
4
3
2
1



International Edition


About the Book

Chapter 1: Introduction

This chapter is designed to introduce the reader to me, why I'm knowledgeable on the subject and to set the expectations of what they'll learn throughout the book.

Chapter 2: The Cybersecurity Wild West

This chapter discusses the wide-range of cybersecurity products and understanding the risks and pitfalls aligned with blindly working with a vendor. How to understand what you get for your money and how to get the most out of any commercial partnerships you enter into.

Chapter 3: Cyber Threat Intelligence - What does it even mean?

This chapter discusses critical intelligence concepts such as the intelligence cycle, setting intelligence requirements, the diamond model and how we apply intelligence to existing security information (by way of Mitre ATT&CK).

Chapter 4: Structured Intelligence - What's The Point?

This chapter builds on chapter 3, and discusses the benefits of adding structure to intelligence data. We'll discuss STIX and why it's important, aligning STIX to ATT&CK and how structured intelligence helps improve final intelligence reporting.

Chapter 5: Determining what your business needs

This chapter will look at how to approach CTI depending on your budget, the business itself (and its underlying sector/industry), what already exists within the organization and how you could expand and automate some aspects of the collection.

Chapter 6: How Can I Implement This? (No matter what budget you have)

This chapter will look at the main factors of CTI, accepting what gaps might exist (if you have no budget), and how you could potentially consider trying to fill them. We'll discuss how to priorities areas when it comes to funding and the best approaches to incident response, requests for information or ad-hoc reporting.

Chapter 7: Things to consider when implementing CTI

This chapter will look at an organizations footprint and understanding the risks associated with your organization-the gaps left by funding or vendor/IT black holes in your estate and staffing and resourcing.

Chapter 8: The importance of OSINT

Open-Source Intelligence is a significant part of a successful CTI practice. This chapter will look at what OSINT is (and can be), what an analyst or investigator needs in terms of necessary tooling to succeed, how to create and maintain accounts for research purposes and what to do if you can't immediately employ Human Intelligence (HUMINT) into your collection.

Chapter 9: I already pay for vendor X. Should I bother?

This chapter is designed to assist the reader in critically evaluating the service they receive from their existing vendors. This includes what they do well, what they don't do well (or at all), how you can improve on this, what things you should consider moving in-house rather than outsourcing, and the benefits of finding and maintaining relationships with excellent vendors.

Chapter 10: Summary

This chapter will summaries the main themes discussed in each chapter. The next steps that should be imperative to any organization, how the reader could follow up with me for any questions or comments, and if they can't do anything today, what they should take away from the book to try and improve their CTI practice.

Chapter 11: Useful Resources

This chapter will list several useful resources the reader could investigate to help them on their way to set up a successful CTI team, broken down into sub-headings.


About the Author:

Aaron Roberts is an intelligence professional specializing in Cyber Threat Intelligence (CTI) and Open-Source Intelligence (OSINT). He is focused on building intelligence-led cyber capabilities in large enterprises and conducting online investigations and research. He has worked within several the public and private sectors as well as the British Military. As such he understands how intelligence can and should be utilized within a range of environments and the fundamental approach that businesses must take to get the maximum value out of their cyber threat intelligence program.


Best Sellers



Product Details
  • ISBN-13: 9781484272190
  • Publisher: Apress
  • Publisher Imprint: Apress
  • Height: 234 mm
  • No of Pages: 207
  • Spine Width: 12 mm
  • Weight: 381 gr
  • ISBN-10: 1484272196
  • Publisher Date: 25 Nov 2021
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Sub Title: The No-Nonsense Guide for Cisos and Security Managers
  • Width: 156 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

     5  |  1 Reviews 
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
     5  |  1 Reviews 
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    Cyber Threat Intelligence
    Apress -
    Cyber Threat Intelligence
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    Cyber Threat Intelligence

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals



      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!